Man-in-the-middle attack
Man-in-the-middle attack “Man-in-the-Middle” translates as middleman. Because in such an attack, someone places themselves as a middleman between two communication parties – without their knowledge.The aim is to read the communication, to change it if necessary and to find out confidential information such as passwords and login data. What is meant by man-in-the-middle attack in […]
Malware
Malware Is synonymous with malicious program or malware. For more information, see our glossary entry on malware.
Malvertising
Malvertising Malvertising (a short form of “malicious advertising”) refers to a method in which online advertisements are deliberately misused to spread malware (malware). The ads seem harmless at first glance and often even appear on reputable websites, but contain hidden malicious code. What exactly is malvertising? In malvertising, cybercriminals place manipulated advertisements via common advertising […]
Keylogger
Keylogger The term is made up of the English “key”, here for “key” and “logger” for “record, log”. Keyloggers are hardware or software that log inputs from a keyboard. This allows cybercriminals to identify passwords and PIN numbers, for example, and then misuse them. Keyloggers are classified as malicious programs (malware) and are assigned to […]
Internet of Things (IoT)
Internet of Things (IoT) Internet of Things (IoT) means “Internet of Things”. The term refers to the networking of objects or devices with the Internet. Such devices include, for example, smartwatches, smart TVs and surveillance cameras. They contain small, Internet-enabled computers. These computers are vulnerable through their connection to the Internet. Cybercriminals can manipulate them […]
Incognito mode
Incognito mode Incognito mode (also: “private mode”) is a feature of modern web browsers that allows you to surf the Internet without certain data being permanently stored on the device you are using. It is often used to increase privacy when browsing. What does incognito mode do exactly? When browsing in incognito mode, the following […]
Incident Response
Incident Response The English term can be translated as “reaction to an incident”. In IT security, this concerns the response to a cyber incident. This response can be handled by the company’s own Incident Response Team (your administrator or administrator). your IT department) or by external service providers. It is important that the reaction is […]
Hosted in Germany
Hosted in Germany Hosted in Germany translates as “accommodated in Germany” and refers to data. More precisely: on websites, software and information whose data is stored on German servers. Loosely translated, “hosted in Germany” means “stored in Germany”. What does “Hosted in Germany” mean in detail? Data stored in Germany is subject to German law […]
Honeypot
Honeypot Honeypot refers to special, secure networks that are set up as a trap for criminal hackers . Just as a honeypot attracts wasps, the digital honeypot is designed to attract cybercriminals. They are distracted from other targets and at the same time demonstrate their approach – without causing damage. What does a honeypot look […]
Headhunter scam
Headhunter scam – Social engineering through supposed job offers The headhunter scam is a form of social engineering. Cybercriminals pretend to be recruiters or headhunters in order to deliberately deceive professional contacts. The aim is to obtain confidential information or spread malware – usually through manipulated links or file attachments. How does the scam work? […]